Abstract
This paper presents new text steganography approach named as Crossover Encryption Based Text Steganography (CEBTS) approach. This approach is a combination of random character sequence and feature coding method. In this approach in order to hide the secrete message, we first encrypt the message and then mix it in the cover text. Cover text is generated by random character sequence. In this approach the key is generated from the very first three character of the cover text by using crossover technique between these three characters. This generated key will be used to encrypt the plain text and this key will also used to decide that how the encrypted message will hide with cover text. For this approach we have developed two algrithms, one is for key generation using crossover technique and then encrypt the message using this key and hide the encrypted message into cover text using this key and second is used to retrieve the secrete message. We are also presenting comparison of our proposed approach with some of the previous popular text steganographic approaches with execution time and also the length of cover text which will be required to encipher using n bit cover text. At the last in our conclusion section we are showing that how our approaches are performing best in the existing approaches.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chaudhary S, Mathur P, Kumar T (2013) A capital shape alphabet encoding (CASE) based text steganography. In: Sharma R (ed) Conference on advances in communication and control systems 2013 (CAC2S 2013), India
Agarwal M (2013) An efficient dual text steganographic approach: hiding data in a list of words. In: Computer networks and communications (NetCom), vol 131. Lecture notes in electrical engineering Springer, New York
Shirali-Shahreza M (2008) Text steganography by changing words spelling. In: 10th IEEE international conference on advanced communication technology, Korea
Shirali-Shahreza M, Shirali-Shahreza MH (2007) Text steganography in SMS. In: IEEE international conference on convergence information technology
Khan F (2009) Enhanced text steganography in SMS. In: 2nd IEEE international conference on computer, control and communication
Shirali-Shahreza M, Shirali-Shahreza MH (2006) A new approach to Persian/Arabic text steganography. In: 5th IEEE/ACIS international conference on computer and information science (ICIS COMSAk’06), pp 310–315
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4):313–336
Alla K, Shivramprasad R (2009) An evolution of Hindi text steganography. In: 6th IEEE international conference on information technology
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security & Privacy, pp. 32-44, May/June 2003
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Kumar, T., Pareek, A., Kirori, J., Nehra, M.S. (2014). Development of Crossover and Encryption Based Text Steganography (CEBTS) Technique. In: Sengupta, S., Das, K., Khan, G. (eds) Emerging Trends in Computing and Communication. Lecture Notes in Electrical Engineering, vol 298. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1817-3_12
Download citation
DOI: https://doi.org/10.1007/978-81-322-1817-3_12
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1816-6
Online ISBN: 978-81-322-1817-3
eBook Packages: EngineeringEngineering (R0)